This whitepaper shares the different measures that the GoodData Enterprise Insights platform has adopted to protect its customers’ data. It also outlines the company’s internal security compliance standards.

This whitepaper shares the different measures that the GoodData Enterprise Insights platform has adopted to protect its customers’ data. It also outlines the company’s internal security compliance standards.

It is no secret that today’s attacks tend to avoid network perimeter defenses. These defenses have improved significantly over the years, and they provide a reasonably strong barrier to entry. Consequently, the weakest attack surface has become user devices in the office and on the road. Compromise of end-user devices creates opportunities to pivot to other resources on the network, including servers. This is a problem because traditional security approaches assume any network segment behind the security perimeter, and its attached devices, is safe. Further,...

The General Manager of SureID, Ned Hayes, weighs in on how the use of biometrics technology has evolved over the years, allowing governments and users to create stricter laws around human rights and privacy. From iris scans to voice typing and gait tracking, Ned lets us know about the new methods of biometrics today and the security parameters that relate to them. As a technologist, identity researcher and author himself, Ned has created awareness on biometrics technology through his books and work. His most recent novel was the national bestseller The Eagle Tree...

Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: GDPR challenges for email How to mitigate risks and ensuring email resiliency An effective email and cloud security platform

Cybersecurity attacks and data breaches are on the rise. Data breach laws exist requiring organizations to notify users that their personal information has been compromised. Understanding these laws and their importance is critical for effective data protection. There have been more large-scale cybersecurity attacks in 2017 than in any previous year. In fact, according to Gemalto, almost 2 trillion data records were compromised during the first half of 2017 alone. Everyone from multi-national companies to big banks, hospital networks and even credit bureaus have...